Multimedia Communication Services Traffic Modeling and Streaming
|
|
- Sheena Beasley
- 5 years ago
- Views:
Transcription
1 Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia
2 Medium Access Control: why Multiple nodes: Dedicated or Shared transmission medium? 1. Solution everybody connected to everybody else : E.g., N nodes connected to all others N ( N -1 ) separated cables Unpractical and expensive Unfeasible!! 2. Solution everybody connected to intermediator E.g., N nodes connected to intermediator N separated cables What if cables are virtual, i.e., radio signals? What is the intermediator? Bottom line: need to arbitrate transmissions Think to a talk show: anchorman decides who speaks Arbiter can be physical entity Arbitration can be a distributed algorithm Nodes decide who will transmit next Traffic Modeling and Streaming 2
3 Medium Access Control: why Today: PCs connected by Ethernet switches (wired) Dedicated cables, PC-to-switch (star-like topology) No collisions but excess frames can be dropped Yesterday: PCs connected by Ethernet coax (wired) Single shared transmission medium (bus-like topology) Cheap, suited to old fashioned traffic patterns, mostly bursted Lot of issues, hard to localize, low performance 50Ω Common bus (shared) 50Ω Network interfaces Signal flow along both directions, cancelled by 50Ω terminators TODAY: SAME APPROACH IN WIRELESS NETWORKS!! Traffic Modeling and Streaming 3
4 MAC: approaches Final goal for a MAC algorithm Avoid collisions when multiple nodes can transmit at the same time Deterministic algos (no collisions): Time Division Multiple Access (TDMA) Frequency/Wavelength Division Multipling (FDM,WDM) Token Passing (Token Ring, Token Bus, FDDI) Non deterministic algos (with collisions): Aloha Carrier Sense Multiple Access Carrier Sense Multiple Access/Collision Detection: Ethernet, Carrier Sense Multiple Access/Collision Avoidance: abgn Traffic Modeling and Streaming 4
5 MAC: non deterministic Need rules to recover after collisions (storms possible too) Aloha: simple algo, uses positive ACK to detect collisions Note: it s not a layer 4 ACK CSMA: like Aloha but checks medium is free before transmitting CSMA/CD: no ack, checks collisions during transmission Used in IEEE802.3 (Ethernet) networks CSMA/CA: like CSMA with more complex rules to avoid collisions Used in IEEE (WiFi) networks All these methods do not support high traffic patterns Time wasted during collisions + need more time to recover If traffic above a threshold: network collapse Traffic Modeling and Streaming 5
6 Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia
7 AlohaNet Aloha: primitive algorithm (1971!), basis for the others Design to implement network between HawaÏ Isles Low bit-rate UHF channels, frequency f fixed Broadcast transmissions Need positive ACK ACK Transmission procedure i=1! while ( i <= maxattemps ) do!!send packet!!wait for acknowledgement or timeout!!if ack received then leave!!wait for random time!!increment i! ACK is broadcasted too: red arrow: a logic flow Blue arrows: physical flow end do! Traffic Modeling and Streaming 7
8 AlohaNet Don t listen the channel before and during transmission Tx&Rx at the same time was too complex to implement in 1971 When node has packet, transmit it immediately Wait for a positive ack transmitted by the receiver No ack means packet was lost Retransmit it Two versions: Slotted Aloha: time is slotted, stations are synchronized E.g., all packets have the same length Non-Slotted Aloha: no rules for packet length and timings Traffic Modeling and Streaming 8
9 Slotted Aloha Based on slotted time, a few hypotheses: All packets have the same length Each packet is transmitted in a time-unit Δt (slot) Transmitters are synchronized: tx t start = j Δt, t end ( j + 1 ) Δt Arrival times are poisson i.i.d. at everyone of m nodes Global arrival rate is λ, local is λ/m Collision: if two or more nodes transmit in the same slot Receivers do not understand packets and transmitters No collision: only one node transmits Note: we neglect transmission errors!! Traffic Modeling and Streaming 9
10 Slotted Aloha: simple analysis Retransmission strategy: a) Each node works (busy) on only one packet at time: no queuing b) Busy node said Backlogged, two cases A new (fresh) packet is waiting for transmission, occur in the next slot An old packet is waiting for retransmission after collision, occur in the next slot c) After collision a packet will be transmitted soon or later d) Nodes are infinite ( m = ); e) New packets only at idle (non busy) nodes Notes Because of d) λ/m tiny arrivals at Backlogged nodes are negligible Only few nodes are Backlogged Because of a) maximum delay is limited queue 1 slot N slot N+1 t = now Traffic Modeling and Streaming 10
11 Slotted Aloha: simple analysis/2 Summing up: A new (fresh) packet arrives only in a non Backlogged node This packet will be transmitted asap in the next slot, collision is possible When slot ends: node knows if packet collided or was received Collided: node turns Backlogged, waits for some (random) slots, retransmits Received: node turns idle, waits for a fresh packet Arrival/transmission model: Fresh packets transmitted in the same slot: Poisson, rate λ Total transmissions/slot: Poisson, rate µ > λ Includes fresh and retransmitted packets! When collision occurs, involved nodes turns backlogged Fresh arrivals: Poisson λ slot N-1 slot N slot N+1 Transmissions: Poisson µ, G = µt Let be G = µ T is the offered traffic t = ora 11 Traffic Modeling and Streaming
12 Slotted Aloha: simple analysis/3 Let s focus on a node which we know it will transmit in the next slot Tx has success if nobody else transmits a) 0 tx (non-bcklgd nodes with no pkts, bcklgd do not trx) b) 1 tx (at least one node txed), collision! G P( k) k = e G k! Successful transmission, P OK = P( k = 0)= e -G On average in a slot G packets are attempted - Of these only P OK are received which leads to throughput Ge -G = D(G) Upper bound for D(G) is: D G = Ge G G = e G Ge G = 0 G =1,D max =1/e Traffic Modeling and Streaming 12
13 Slotted Aloha: simple analysis/4 If channel possibilities are known Find maximum number of arrivals λ More than that is useless, no possibilities to transmit it! Must be λt < 1/e : two values of G so that D(G) = λt In G [G min, G max ] network works If G < G min either Too few traffic generated Too few retransmissions If G > G max too many retransmissions Varying G means change retransmission rate at bcklgd nodes Traffic Modeling and Streaming 13 T
14 Aloha: simple analysis Hypotheses: Infinite nodes All frames have the same length, require T for transmission fresh traffic is Poisson, arrival is λ, and it is transmitted immediately Backlogged nodes Retransmit independently of the others (including backlogged and not) Wait exponentially distributed time retransmitted traffic is Poisson Number of packets transmitted including fresh and retransmissions Poisson process with µ > λ Let be G = µt the offered traffic Traffic Modeling and Streaming 14
15 Aloha: simple analysis/2 Let s focus on a node that starts transmitting in t = 0 Tx is OK (success) if no other node transmits k = 0 nodes have transmitted in [-T, T ] (apart the one we know) Probability P(tx OK) = P suc = P[ k = 0 ] = exp(-2µt ) Success on average: E[suc] = 1 P suc + 0 [1 P suc ] = exp( -2µT ) On long time s : µs frames txed, and µs exp(- 2µT) successful Average throughput (over T ): θ = µt exp( - 2µT ) If 2µT = 2 G =1 we get θ max θ max = 1/(2e) 0.18 T T t = 0 Traffic Modeling and Streaming 15
16 Aloha vs Slotted-Aloha Slotted-Aloha more efficient: Removing uncertainty at beginning of a transmission attempts increase network efficiency! Offered traffic G Traffic Modeling and Streaming 16
17 Aloha-slotted: simulation Infinite nodes {method 1} Set packet length (duration) T, fixed Set G, offered traffic in T (include fresh + retransmission) Set µ = G/T (arrival density), initialize T suc = 0, T tot = 0 Repeat N times the experiment: Focus on transmission starting in t = 0 Choose Y, exponential s. side r.v. mean 1/µ, time to next arrival Tx success if Y > T next arrival transmitted with next slot! Y Cumulate success T suc = T suc + T Refresh T tot = T tot + Y Compute throughput θ G Change G, plot θ = θ(g) ( ) = T suc Prev pkt Cur pkt T T T t = 0 tot Traffic Modeling and Streaming 17
18 Aloha: simulation Infinite nodes {method 1} Set packet length (duration) T, fixed Set G, offered traffic in T (include fresh + retransmission) Set µ = G/T (arrival density), initialize T suc = 0, T tot = 0 Repeat N times the experiment: Focus on transmission starting in t = 0 Choose Y, exponential s. side r.v. mean 1/µ, time to next arrival Tx success if Y > 2T next arrival transmitted after this packet Cumulate success T suc = T suc + T Refresh T tot = T tot + Y Compute throughput Change G, plot θ = θ(g) ( ) = T suc θ G T tot Traffic Modeling and Streaming 18 T Y min t = 0 T
19 Aloha-slotted: simulation Infinite nodes {method 2} Simulate consecutive arrivals, check if collisions occur in every slot KO OK KO KO OK Y 1 Y 2 Y 3 Y 4 Y 5 Y 6 Y 7 Slot k-th extends in [(k 1)T, kt ] Cumulate inter arrival times Y n If cumulated time exceeds kt : go to next slot (k+1)-th - Count arrivals inside the slot, if only 1 increase success Traffic Modeling and Streaming 19
20 Aloha-slotted: simulation Infinite nodes {method 2}/2 Set T, offered rate G, T TOT, now = 0, now SLOT = 0, suc = 0, arr SLOT = 0 while ( now T TOT ) Choose Y, r.v. exponential s. side mean 1/µ, µ = G/T, now SLOT = now SLOT + Y if now SLOT > T : count arrivals, go to next slot if arr SLOT == 1: suc++ now SLOT = now SLOT % T (modulo, or remainder) arr SLOT = 0 Increase arr SLOT Refresh now = now + Y Compute channel usage θ(g) = suc T/T TOT Change G, plot θ = θ(g) Traffic Modeling and Streaming 20
21 Aloha: simulation Infinite nodes {method 2} Maintain collision state coll T now current time T END end time current transmission T now = T END coll=0 Example: T=1 t=0 Y=1 T now +=1=1 T now > T END &coll==0 T END = T now + T = 2 t =0 t =1 set T suc ++, coll=0 t =0 t =1 t =2 T END T now T now T END Y=0.5 T now +=0.5=1.5 T now < T END T END = T now + T = 2.5 t =0 t =1.5 set coll=1 t =2 t = 0 t = 1.5 t =2.5 T now T END Y=1.5 T now +=1.5=3 t =0 t =2 t =3 T now >T END &coll==1 set coll=0 T now T END T END = T now + T = 4 t =0 t = 3 t = 4 T END T now T now T END Traffic Modeling and Streaming 21
22 Aloha: simulation Infinite nodes {method 2}/2 Set packet length (duration) T fixed and offered traffic G Initialize T suc = 0, T now = 0, T end = 0, coll = 0, T TOT while( T now T TOT ) Compute Y, r.v. exponential s. side mean 1/µ, µ = G/T Refresh T now = T now + Y if T now > T end : current packet does not collide with previous ones if coll == 0 : last tx OK» set T suc = T suc + T set coll = 0, T end = T now + T else : collision coll = 1 Compute throughput θ(g) = T suc / T tot KO coll=1 T now coll==1 KO coll=0 coll==0 OK Traffic Modeling and Streaming 22 T T end T now T coll=0 T end T now
23 Aloha vs Slotted-Aloha, theory and simulation Offered traffic G Traffic Modeling and Streaming 23
COMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationCSMA/CD (Collision Detection)
CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Medium Access Control algorithms Simulation of AlohaNet (not slotted) with finite number of nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master
More informationWhere Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design
Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design Layered Architecture Layered Architecture Data Link Layer Functionality
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationProtocols for Multiaccess Networks
Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationLecture 19. Principles behind data link layer services Framing Multiple access protocols
Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationLecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationLink layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationChapter 5: Link layer
Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationLecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationLinks. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel
Link Layer Error Detection Nodes Links Frame R yclic Redundancy hecksum Parity its More about this in exercise! Data Link Layer -1 Data Link Layer -2 Links Two types of links : point-to-point broadcast
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host
More informationCSE 461 Multiple Access. David Wetherall
CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationComputer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon
15-441 Computer Networking Lecture 5 Data link Layer Access Control Based on slides by Peter Steenkiste Copyright, Carnegie Mellon 2007-12 1 Datalink Functions Framing: encapsulating a network layer datagram
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More information